9.8

CVE-2022-23088

The 802.11 beacon handling routine failed to validate the length of an IEEE 802.11s Mesh ID before copying it to a heap-allocated buffer.

While a FreeBSD Wi-Fi client is in scanning mode (i.e., not associated with a SSID) a malicious beacon frame may overwrite kernel memory, leading to remote code execution.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
FreebsdFreebsd Version < 12.3
FreebsdFreebsd Version >= 12.4 < 13.0
FreebsdFreebsd Version12.3 Updatep1
FreebsdFreebsd Version12.3 Updatep2
FreebsdFreebsd Version12.3 Updatep3
FreebsdFreebsd Version12.3 Updatep4
FreebsdFreebsd Version13.0 Updatebeta1
FreebsdFreebsd Version13.0 Updatebeta2
FreebsdFreebsd Version13.0 Updatebeta3
FreebsdFreebsd Version13.0 Updatebeta3-p1
FreebsdFreebsd Version13.0 Updatebeta4
FreebsdFreebsd Version13.0 Updatep1
FreebsdFreebsd Version13.0 Updatep10
FreebsdFreebsd Version13.0 Updatep2
FreebsdFreebsd Version13.0 Updatep3
FreebsdFreebsd Version13.0 Updatep4
FreebsdFreebsd Version13.0 Updatep5
FreebsdFreebsd Version13.0 Updatep6
FreebsdFreebsd Version13.0 Updatep7
FreebsdFreebsd Version13.0 Updatep8
FreebsdFreebsd Version13.0 Updatep9
FreebsdFreebsd Version13.0 Updaterc1
FreebsdFreebsd Version13.0 Updaterc2
FreebsdFreebsd Version13.0 Updaterc3
FreebsdFreebsd Version13.0 Updaterc4
FreebsdFreebsd Version13.0 Updaterc5
FreebsdFreebsd Version13.0 Updaterc5-p1
FreebsdFreebsd Version13.1 Updateb1-p1
FreebsdFreebsd Version13.1 Updateb2-p2
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 7.85% 0.917
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
134c704f-9b21-4f2e-91b3-4a467353bcc0 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE-94 Improper Control of Generation of Code ('Code Injection')

The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.